SMesser_Information System Security Policy - INFORMATION SYSTEM SECURITY POLICY Stormie N Messer TABLE OF CONTENTS 1.0 Overview.2 2.0 Purpose.2 3.0

SMesser_Information System Security Policy -...

This preview shows page 1 - 5 out of 10 pages.

Stormie N Messer 6/12/2020 INFORMATION SYSTEM SECURITY POLICY
T ABLE OF C ONTENTS 1.0 Overview ............................................................................................................................................... 2 2.0 Purpose .................................................................................................................................................. 2 3.0 Scope ..................................................................................................................................................... 2 4.0 Policy ..................................................................................................................................................... 2 4.1 Acceptable Use Policy for End-Users .................................................................................................. 2 4.2 Remote Access Policy ......................................................................................................................... 3 4.3 Email Policy ........................................................................................................................................ 3 4.4 Unauthorized Access .......................................................................................................................... 3 4.5 Anti-Virus Protection .......................................................................................................................... 4 4.6 Logging Standards .............................................................................................................................. 4 4.7 Physical Access Control Policy ............................................................................................................ 5 4.8 Operating System Updates ................................................................................................................. 5 5.0 Policy Compliance ................................................................................................................................. 6 5.1 Compliance measurement ................................................................................................................. 6 5.2 Exceptions .......................................................................................................................................... 6 5.3 Non-Compliance ................................................................................................................................ 6 6.0 Definitions and Terms ............................................................................................................................ 6 7.0 Revision History .................................................................................................................................... 8 Information System Security Policy 1.2 June 2020
I NFORMATION S YSTEM S ECURITY P OLICY 1.0 Overview Security for Lopes Manufacturing’s systems and data are of the utmost importance; therefore, setting these security guidelines in place will safeguard the system from threats and attacks. 2.0 Purpose This policy outlines the security and protection implementation of Lopes Manufacturing’s Information Systems. It serves as a guideline and standard for the management and assurance of confidentiality, integrity, and availability of sensitive information. All managers, users, and personnel must comply to the standards outlined within this policy in which to care for the Information Systems of Lopes manufacturing including devices, equipment, environment, and the information assets. 3.0 Scope This policy is applicable to all users of Lopes Manufacturing information systems. This includes all employees, customers, temporary employees, vendors, partners, and contractors regardless of their location. The scope of this policy covers all Information Systems environments operated by Lopes Manufacturing this includes, but is not limited to, operational systems that may be contracted by Lopes Manufacturing, all documentation, physical and logical controls, personnel, software and information. 4.0 Policy 4.1 A CCEPTABLE U SE P OLICY FOR E ND -U SERS Users shall demonstrate respect and show restraint when it comes to shared resources. These resources include the following: Intellectual property, ownership of data, system security mechanisms, and an individual's rights to privacy and freedom from intimidation, harassment, and unwarranted soliciting. Users shall respond punctually and properly to report theft, loss or unauthorized disclosure of Lopes Manufacturing proprietary information. Users shall access, utilize, or use proprietary information in common means with others only to the extent it is authorized and deemed necessary for completion of the assigned work duties. Good judgment shall be used regarding personal use according to the departmental policies on personal use. Users shall Back-up critical information and documentation onto the appropriate designated network drives. Information System Security Policy 1.2 June 2020
Users shall make their passwords complex and comply to the standards outlined in Unauthorized Access .

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture